⌨️
Penetration testing & ethical hacking concepts
Ctrl
k
Copy
Methodology
Post exploitation/priviesc
1
User privileges
id
, sudo, etc.
2
SUID/SGID bit
3
File permissions
4
Environment variables
5
Cronjobs
6
Kernel exploit
7
Automated tools
winpeas, linpeas, etc.
Previous
Exploitation/initial access
Next
What are attacks on routing protocols?
Last updated
27 days ago